GDPR, Information Security, and the IT Service Desk

Size: px
Start display at page:

Download "GDPR, Information Security, and the IT Service Desk"

Transcription

1 GDPR, Information Security, and the IT Service Desk A survey-based snapshot of the IT industry in May 2018

2 Executive Summary Information security is a growing concern and budget item for most, if not all, organisations. It s a technology-related area that has done what most fail to do that s raising itself to be a topic for board-level attention and concern. In Q2 2018, and just before the introduction of the new EU General Data Protection Regulation (GDPR) law, the Service Desk Institute (SDI) undertook a survey of UK-based IT Service Desk Managers to understand more about how their organisations are tackling both information security and the implications of the impending GDPR go live. The key findings were that: Close to 20% of IT service desks don t authenticate end-users when conducting password resets 31% of service desks have no formal process or technology to support this end-user authentication for password resets Nearly two-thirds of IT service desks offer end users an automated password reset capability 21% of organisations (that offer an automated password reset capability) successfully see more than 80% of password resets handled by the automated method 68% of organisations (that offer an automated password reset capability) see less than 60% of password resets handled this way 83% of respondents think that, despite controls being in place, it s still possible for a criminal to gain a password to a legitimate end-user s account (via the IT service desk) 22% of survey respondents stated that their IT service desk doesn t have formal mechanisms in place to ensure the identity of service requesters 47% of respondents state that all service desk staff have privileged access for Active Directory password resetting, versus 38% where this is limited to a select group, and 12% where no one on the service desk has the ability 83% of respondents stated that their organisations use encryption for PCs, with only 11% stating that their organisations didn t Only 32% of respondents stated their IT service desk s authentication process(es) are tied in with the organisation s overall GDPR changes. And just as worryingly, 15% of respondents stated that there was no corporate GDPR initiative in place, 26% that said that their s wasn t in line, and a further 28% didn t know There s no clear winner for the department/team responsible for GDPR within organisations. 26% of respondents stated that it s the IT organisation, HR 20%, and a different team 44% which could be a variety of other departments/teams. The full results of this survey, and their implications, are detailed in this report. Read on to understand where your organisation sits relative to the IT industry as a whole. 2 GDPR, Information Security, and the IT Service Desk

3 Survey Respondent Information The SDI survey was undertaken by people in management-level IT service desk roles. Their service desks support a range of end users/customers, with the mix as follows: Internal business customers 64% External business customers 29% External consumers 7% In terms of where their organisations customer data is located which could be in IT service management (ITSM), customer help desk, customer relationship management (CRM), or other tools the breakdown between on-premises and public cloud was: On-premises 31% Public cloud 11% On-premises and public cloud 58% Meaning that 89% of surveyed organisations currently hold employee/customer data in on-premises systems and 69% in public cloud services. With information security and GDPR applicable to both IT delivery models. While the survey questions weren t necessarily asked, and responded to, in this order, it seemed logical for this report to feedback on them. End-User Authentication for Password Resets End users passwords are the virtual keys to accessing a variety of devices, applications, and data. Plus, with the growing use of single sign-on capabilities within organisations, an end-user s Active Directory password provides access to a multitude of services, applications, and data. End-users are often given strict rules on not sharing passwords, not writing passwords down, logging out when leaving devices (and thus applications and data) unattended, and regularly changing their passwords. It s therefore surprising that, as shown in Figure 1, nearly one in five respondents stated that their IT service desk doesn t have a management-defined process for end-user authentication for password resets with the possibility of unauthorised access, and the potential adverse consequences, the information-security equivalent of leaving your home s front door unlocked while away. 3 GDPR, Information Security, and the IT Service Desk

4 Figure 1: Do you have a management-defined process for end-user authentication when end users call for a password reset? For the 77% of service desks that do have a management-defined end-user authentication process for password resets, a variety of checks are in place. These, and their usage, are detailed in Figure 2 (please note that multiple selections were allowed). Figure 2: End-user authentication checks employed during password reset However, while many respondents reported that multiple checks are in place, it should be appreciated that the survey question didn t differentiate between scenarios where there s only one check used per passwords reset, i.e. a single check is undertaken, versus scenarios where multiple checks are applied together for a single password reset. 4 GDPR, Information Security, and the IT Service Desk

5 As to whether this identity checking is facilitated by a formal process or technology, further questioning identified that 31% of service desks have no formal process or technology to support this end-user authentication. Plus, not all service desks with a management-defined end-user authentication process use a formal process or technology to support the checks (as per Figure 3). A deeper analysis of the source data showed that there are two scenarios where a mismatch occurs: 1. Respondents who don t have a management-defined process but do have a supporting process/technology thus they are a No in Figure 1 and a Yes in Figure Respondents who have a management-defined process but don t have a supporting process/technology thus they re a Yes in Figure 1 and a No in Figure 3. Figure 3: Do you have a formal process or technology to support this? The above relates to manual password resets, but what about the use of automated password rest capabilities? Automated Password Reset Capabilities Forgotten password related password resets, especially after holiday periods or where frequent password changes are mandated, are the bane of IT service desks. They re commonly high-volume, low-value-adding, manual tasks that prevent over-worked service desk agents spending their time where it makes the biggest difference in dealing with businessaffecting IT issues. Thankfully, along with a wider spectrum of IT self-service capabilities, automated self-service password reset capabilities are increasingly popular. With this survey showing that they re now used by approximately two-thirds of organisations (see Figure 4 over page). 5 GDPR, Information Security, and the IT Service Desk

6 Figure 4: Do you offer a self-service password reset capability? However, again as is common with corporate IT self-service capabilities, there s a gap between technology-availability levels and usage levels. Thus, even though 64% of organisations offer an automated password reset capability, there s a spectrum of success levels. On the one hand, as shown in Figure 5, 21% of organisations (that use an automated password reset capability) successfully see more than 80% of password resets handled by the automated method. But sadly, on the other, 68% of organisations see less than 60% of password resets handled this way with the rest defaulting back to manual service desk operations. Figure 5: If YES, what is your approximate adoption rate for self-service password reset? There s thus the need to understand and address the reasons for these low adoption levels. This might be caused by one or more of: A lack of awareness, with end users still calling the IT service desk as they always have Ease of access, i.e. the automated reset capability isn t easy to find and access when needed Ease of use Limitations on the types of passwords that can be reset which not only lowers the percentage of resets handled but also prevents end users returning when their previous attempt, for a non-supported password type, failed. But, ultimately, you ll need to understand the low adoption levels in the context of your organisation. 6 GDPR, Information Security, and the IT Service Desk

7 Password Management Policies So far, this report has looked at the security controls related to the unplanned and potentially unauthorised changing of passwords. However, the survey respondents were also asked about their organisations security-related policies related to password creation and periodic changing. Starting with the traditional view on password management the most concerning of responses, shown in Figure 6, is that 7% of respondents stated that their organisations don t mandate, or enforce, periodic password changes. And 4% stated that, whilst this occurs, the frequency is less than every nine months. Again, taking the traditional view, the good news is that 84% of respondents stated that their service desks mandate that end-users must change their Active Directory passwords at least every six months. However, the thinking around password-lifecycle policy is changing. For example, the National Institute of Standards and Technology (NIST) part of the U.S. Department of Commerce has written extensively on identity and access management (IAM), including that: Verifiers SHOULD NOT require memorised secrets to be changed arbitrarily (e.g. periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator. In other words, passwords should NOT be changed based on a frequency. Thus, your organisation s stance on IAM might need to be reconsidered based on the current thinking of your corporate information security experts who may or may not agree with NIST s advice. 7 GDPR, Information Security, and the IT Service Desk

8 Figure 6: How often must end users change their Active Directory password? Another important factor in password management is the set of rules that dictate what needs to be included in, and what can t be included in, passwords. For example, the need for: A minimum password length (often eight characters or higher) A mix of letters and numbers A least one capital letter At least one special character such as!, $, %, &, No consecutively repeated characters No forbidden passwords such as: Password and policy-compliant variants such as: P455w0rd , , and other easy-to-remember numerical sequences abcdefgh and other easy-to-remember alphabetical sequences Nouns and proper nouns, i.e. dictionary words. Traditional password management thinking has been to make passwords as complicated as possible to ensure that they re strong and robust to breaking. However, it also makes them harder for the end user to remember and can bring about unwanted human practices, such as keeping a reminder of the password on a post-it note, that negate the original intention of securing devices, applications, and data. 8 GDPR, Information Security, and the IT Service Desk

9 Modern-day thinking on password composition is also breaking away from tradition, with NIST also stating that: Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Again, it s a good idea to check with your corporate information security experts as to their current stance on passwords. As to the use of forbidden passwords, 76% of respondents stated that their organisations Active Directory systems will prevent them being used, with only 13% allowing them (as per Figure 7). This latter figure should really be at 0%, so please check the situation within your organisation. Figure 7: Does your Active Directory system prevent the use of forbidden passwords? 9 GDPR, Information Security, and the IT Service Desk

10 Unauthorised Password Use Whilst the previous survey questions looked at the controls in place, additional survey questions were asked about the robustness of the controls starting with respondent opinions as to whether their organisation s controls are sufficient to protect end-user passwords (and thus prevent unauthorised access to the corporate network, applications, and data). As shown in Figure 8, 83% of respondents think that, despite the controls being in place, it s still possible for a criminal to gain a password to a legitimate end-user s account. 31% think that their service desk needs to do more to prevent this but 51% believe that it could still happen despite doing everything possible to prevent it. These statistics equally apply to both the respondents who don t have a management-defined authentication process and those who do. Figure 8: In spite of your authentication process, do you think it s possible for a criminal (internal or external) to get a password for a legitimate end user s account? Unable to answer As to the reality of the risks of unauthorised access to end-user data, Figure 9 shows that 27% of respondents stated that their organisation had identified unauthorised access attempts. Although, this might be just the tip of the iceberg because, ignoring the 32% that responded with either Don t know or Unable to answer, how many of the 42% who stated that their organisation hadn t identified any unauthorised access attempts (in the last 12 months) were either not: 1. Monitoring for unauthorised access attempts, or: 2. Suitably equipped to identify unauthorised access attempts? The point being that, just because no attempts were identified, it doesn t mean that none were attempted or even successful. 10 GDPR, Information Security, and the IT Service Desk

11 Figure 9: Has your organisation identified any attempts to gain unauthorised access to end-user data in the last 12 months? 11 GDPR, Information Security, and the IT Service Desk

12 Service Desk Operations and Security Whilst the topic of password security might seem obvious because it s something that has significant business value in preventing unauthorised access to the corporate network, applications, and data what about other aspects of IT service desk operations? As with the question on using a management-defined process for password reset authentication, approximately 20% of survey respondents stated that their IT service desk doesn t have formal mechanisms in place to assure the identity of service requesters (see Figure 10). However, this wasn t the same set of respondents with a less than 25% overlap between the two. Figure 10: Are there steps taken to authenticate a person asking for services in general from the service desk? The risks associated with unauthorised access to service desk services will differ between organisations and the services that their service desks provide. The important thing is to understand what s at risk for your service desk, and organisation, if service desk agents engage without checking the identity of the caller, chat-participant, or er. For instance, the easy-to-believe scenario of a service desk agent unwittingly providing the home address of a home worker to a third-party purporting to be them: Do you still live at?. This also ties in with the personal data related GDPR risks and requirements in the next section. But the risk or threat might not always come from outside, it can also come from within the IT service desk. Thus, the survey respondents were asked who, within the service desk, can reset end-users passwords. The results are shown in Figure 11, with 47% of respondents stating that all service desk staff have the capability, versus 38% where this is limited to a select group, and 12% where no one on the service desk has the ability. While still at an unfortunately low level in 2018, the latter reflects modern-day password management good practice where password manager tools are used instead of relying on service desk staff with privileged passwords. We could expect this number to grow over the next few years, with the technology replacing both unwanted manual efforts and the inherent security risks. 12 GDPR, Information Security, and the IT Service Desk

13 Figure 11: Do service desk analysts have privileged passwords to the Active Directory to reset end users passwords? In addition to password-related security, the survey also asked respondents a question related to device-based encryption. The results, as shown in Figure 12, are that a resounding 83% of respondents stated that their organisations use encryption for PCs, with only 11% stating that their organisations didn t. Figure 12: Does your organisation use encryption for PCs? (such as Bitlocker, McAfee, Checkpoint, etc.) 13 GDPR, Information Security, and the IT Service Desk

14 GDPR Preparedness The new GDPR legislation applies to the personal data processing carried out by organisations operating within the EU plus those outside the EU that offer products/services to individuals within the EU. Under GDPR, those controlling or processing personal data are subject to a number of legal obligations. For instance, those processing personal data are required to maintain records of their personal data and processing activities and what must happen after a data breach. The survey looked at GDPR through a number of lenses, starting with whether the IT service desk s authentication process(es) is tied in with the organisation s overall GDPR changes. Rather worryingly, only 32% of respondents stated that it was and just as worryingly, 15% of respondents stated that there was no corporate GDPR initiative in place, 26% that said that it wasn t, and a further 28% didn t know (see Figure 13). Figure 13: Is the service desk s authentication process part of your organisation s GDPR initiative? Whether the service desk is supporting employees, business customers, or consumers, GDPR still applies to the protection of their personal data. It stipulates that organisations must have procedures in place to detect, report, and investigate data breaches, and GDPR imposes aggressive timescales in which to respond to the required authorities. Thankfully the majority of respondents stated that their organisations already have a process in place or are currently creating one (in time for GDPR go-live) only 4% of respondents stated that their organisation doesn t have such a process. Interestingly though, the majority of respondents didn t know of any specific changes that had been made, in terms of personal-data handling, to reflect the demands of GDPR. 14 GDPR, Information Security, and the IT Service Desk

15 Figure 14: Do you have a process for when you identify a data breach? As to the part of the overall organisation that s responsible for GDPR, the respondents responses showed that it differs considerably between organisations. For example, as shown in Figure 15, 26% of respondents stated that the IT organisation is responsible for GDPR within their company, HR 20%, and a different team 44% which could be made up of a variety of other departments/teams. Over time, however, there will no doubt be GDPR good practices arising that cause the responsibility for GDPR to gravitate towards one particular business department/team over others. Figure 15: Who is responsible for GDPR policies within your organisation? The service desk 15 GDPR, Information Security, and the IT Service Desk

16 Overview This report offers an interesting insight into the current state of GDPR readiness, information security, and the IT service desk as the introduction of the new GDPR looms. Starting with password-related controls: Close to 20% of IT service desks don t authenticate end users when conducting password resets and 31% of service desks have no formal process or technology to support this end-user authentication for password resets. Nearly two-thirds of IT service desks offer end users an automated password reset capability. But only 21% of organisations (that offer an automated password reset capability) successfully see more than 80% of password resets handled by the automated method. 68% of organisations see less than 60% of password resets handled this way. Despite controls being in place, 83% of respondents think that it s still possible for a criminal to gain a password to a legitimate end user s account (via the IT service desk). In terms of some specific IT service desk control points and potential weaknesses, 22% of IT service desks don t have formal mechanisms in place to assure the identity of service requesters. Then, 47% of respondents state that all service desk staff have privileged access for Active Directory password resetting, versus 38% where this is limited to a select group, and 12% where no one on the service desk has the ability. There is good news, however, in that 83% of organisations use encryption for PCs, with only 11% that don t. And finally, in terms of GDPR preparedness, only 32% of IT service desks authentication processes are tied in with the organisation s overall GDPR changes. And just as worryingly, 15% of respondents stated that there was no corporate GDPR initiative in place, 26% that said that their service desk wasn t (in line), and a further 28% didn t know. There s no clear winner for the department/team responsible for GDPR within organisations 26% of respondents stated that it s the IT organisation, HR 20%, and a different team 44%. This lack of consistency for GDPR responsibility is a concern but perhaps expected for something that s still very new to, and untried by, organisations and their people. Time will tell. 16 GDPR, Information Security, and the IT Service Desk

17 About SDI The SDI company mission is to inspire service desks to be brilliant. To achieve this mission SDI has developed a set of goals by which it aims to inspire service desks to: Embrace: To raise the quality of service delivery by valuing best practice Engage: To create an inspiring and engaging customer experience Invest: To empower their teams to be inspired, take action and be better About FastPass FastPass is the leading solution for corporate self-service of passwords. Combined with FastPass Best practices customers achieve high adoption rates of 75-90%. The solution is available on-premise and cloud for AD/ Windows password and other corporate passwords. NEW: FastPass offers a secure and compliant manual authentication process for password reset in the service desk this should be a GDPR requirement. Strong integration to most ITMS systems. FastPassCorp is listed on Nasdaq/Copenhagen/FirstNorth Shine: To demonstrate and deliver exceptional business value SDI sets the globally recognised best practice service desk standards that provide clear and measurable benchmarks for service desk operations and professionals. The standards are designed to encourage service desks to embrace and value best practice in order to raise the quality of service delivery. For more information about SDI please visit

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

General Data Protection Regulation (GDPR) The impact of doing business in Asia

General Data Protection Regulation (GDPR) The impact of doing business in Asia SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP!

THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! Latest Macrium survey results take a detailed look into the backup and recovery space. INTRODUCTION WHO DID WE SPEAK TO? Where are you responsible

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

SCHOOL SUPPLIERS. What schools should be asking!

SCHOOL SUPPLIERS. What schools should be asking! SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated

More information

Up in the Air: The state of cloud adoption in local government in 2016

Up in the Air: The state of cloud adoption in local government in 2016 Up in the Air: The state of cloud adoption in local government in 2016 Introduction When a Cloud First policy was announced by the Government Digital Service in 2013, the expectation was that from that

More information

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) An information security and ediscovery analysis A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: cyber@bsigroup.com Visit: bsigroup.com Executive summary Organizations

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Credentials Policy. Document Summary

Credentials Policy. Document Summary Credentials Policy Document Summary Document ID Credentials Policy Status Approved Information Classification Public Document Version 1.0 May 2017 1. Purpose and Scope The Royal Holloway Credentials Policy

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Crash course in Azure Active Directory

Crash course in Azure Active Directory Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

The SD-WAN security guide

The SD-WAN security guide The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are

More information

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation

More information

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 This privacy policy is published to provide transparent information about how we use, share and store any personal information that you may provide

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

General Data Protection Regulation (GDPR) and the Implications for IT Service Management General Data Protection Regulation (GDPR) and the Implications for IT Service Management August 2018 WHITE PAPER GDPR: What is it? The EU General Data Protection Regulation (GDPR) replaces the Data Protection

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation

More information

GDPR COMPLIANCE REPORT

GDPR COMPLIANCE REPORT 2018 GDPR COMPLIANCE REPORT INTRODUCTION Effective as of May 25, 2018, the European Union General Data Protection Regulation (GDPR) represents the most sweeping change in data privacy regulation in decades.

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

ARCHIVE ESSENTIALS

ARCHIVE ESSENTIALS EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has

More information

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

General Data. Protection Regulations MAY Martin Chapman Head of Ops & Sales Microminder. Presentation Micro Minder Ltd 2017

General Data. Protection Regulations MAY Martin Chapman Head of Ops & Sales Microminder. Presentation Micro Minder Ltd 2017 General Data Please note: - This legislation is untested and open to interpretation. - I am not a Privacy or Data Protection Solicitor. - Should you have any concerns or queries please seek legal advice

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new

More information

EY s data privacy service offering

EY s data privacy service offering EY s data privacy service offering How to transform your data privacy capabilities for an EU General Data Protection Regulation (GDPR) world Introduction Data privacy encompasses the rights and obligations

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective Published on 27 Nov 2018 The term Internet of Things (IoT) has almost been beaten to death at this point, as more and

More information

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...

More information

Operationalize Security To Secure Your Data Perimeter

Operationalize Security To Secure Your Data Perimeter Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Choosing a Full Disk Encryption solution. A simple first step in preparing your business for GDPR

Choosing a Full Disk Encryption solution. A simple first step in preparing your business for GDPR Choosing a Full Disk Encryption solution A simple first step in preparing your business for GDPR beinformed Understand the impact Under GDPR, your organisation is required to protect data stored on devices,

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

Build confidence in the cloud Best practice frameworks for cloud security

Build confidence in the cloud Best practice frameworks for cloud security Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending

More information

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

BACKUP TO THE FUTURE A SPICEWORKS SURVEY BACKUP TO THE FUTURE A SPICEWORKS SURVEY 02 BACKUP TO THE FUTURE A SPICEWORKS SURVEY METHODOLOGY This research study was conducted by Spiceworks, the professional network for the IT industry, from a survey

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR)

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) The GDPR is the biggest change to data privacy laws in the last 20 years and comes into effect on 25 May 2018. The new

More information

How to Stay Compliant with SMS Marketing

How to Stay Compliant with SMS Marketing How to Stay Compliant with SMS Marketing Ensure your text campaigns deliver value to customers and keep your business secure GREAT TIPS INSIDE Even legitimate marketers can fall foul of mobile spamming,

More information

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS WHITE PAPER UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS While IT teams focus on other endpoints, security for corporate printers lags behind Printers make easy targets:

More information

Introductory guide to data sharing. lewissilkin.com

Introductory guide to data sharing. lewissilkin.com Introductory guide to data sharing lewissilkin.com Executive Summary Most organisations carry out some form of data sharing, whether it be data sharing between organisations within the group or with external

More information

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,

More information

Go Cloud. VMware vcloud Datacenter Services by BIOS

Go Cloud. VMware vcloud Datacenter Services by BIOS Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity

More information

74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM

74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM 2014 SIEM Efficiency Report Hunting out IT changes with SIEM 74% OF USERS ADMITTED THAT DEPLOYING A SIEM SOLUTION DIDN T PREVENT SECURITY BREACHES FROM HAPPENING Contents Introduction 4 Survey Highlights

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded

More information

Cyber Resilience - Protecting your Business 1

Cyber Resilience - Protecting your Business 1 Cyber Resilience - Protecting your Business 1 2 Cyber Resilience - Protecting your Business Cyber Resilience - Protecting your Business 1 2 Cyber Resilience - Protecting your Business Cyber Resilience

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Horizon Health Care, Inc.

Horizon Health Care, Inc. Customer Success Story Horizon Health Care, Inc. Comprehensive Security Risk Analysis Helps FQHC Achieve Meaningful Use and Safeguard PHI. Page 2 of 6 Horizon Health Care, Inc. Comprehensive Security Risk

More information

Why Continuity Matters

Why  Continuity Matters Why Email Continuity Matters Contents What is Email Continuity and Why it Matters........................... 1 Challenges to Email Continuity................................... 2 Increasing Email Management

More information

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of

More information

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE WHITEPAPER RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE CONTENTS Executive Summary........................................ 3 Transforming How We Think About Security.......................... 4 Assessing

More information

PRIVACY POLICY BACKGROUND:

PRIVACY POLICY BACKGROUND: PRIVACY POLICY BACKGROUND: SA Designer Parfums Limited understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As

More information

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips

More information

GDPR AND WHAT IT MEANS FOR CRM AND CUSTOMER ENGAGEMENT MAY. A 7-step practical guide to achieving and maintaining GDPR compliance by 25 May 2018

GDPR AND WHAT IT MEANS FOR CRM AND CUSTOMER ENGAGEMENT MAY. A 7-step practical guide to achieving and maintaining GDPR compliance by 25 May 2018 GDPR AND WHAT IT MEANS FOR CRM AND CUSTOMER ENGAGEMENT MAY 25 2018 A 7-step practical guide to achieving and maintaining GDPR compliance by 25 May 2018 A 7-step practical guide to achieving and maintaining

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

VERITAS 2017 TRUTH IN CLOUD REPORT

VERITAS 2017 TRUTH IN CLOUD REPORT WHITE PAPER VERITAS 2017 TRUTH IN CLOUD REPORT The rise of multi-cloud: Combatting misconceptions and realigning data management responsibilities CLOUD-FIRST MENTALITY Today, many organisations are taking

More information

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Digital Transformation Drives Distributed Store Networks To The Breaking Point Digital Transformation Drives Distributed Store Networks To The GET STARTED Overview Forward-looking retailers are realizing the value of cloud- and data center-based applications as they move high-priority

More information

Big data privacy in Australia

Big data privacy in Australia Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

An overview of mobile call recording for businesses

An overview of mobile call recording for businesses An overview of mobile call recording for businesses 1 3 WHY DO WE NEED MOBILE CALL RECORDING? 4 STAYING AHEAD OF THE CHANGING REGULATORY LANDSCAPE Regulatory compliance and mobile call recording FCA (Financial

More information

THE FIVE DEADLY SINS OF PRIVILEGED ACCESS MANAGEMENT

THE FIVE DEADLY SINS OF PRIVILEGED ACCESS MANAGEMENT THE FIVE DEADLY SINS OF PRIVILEGED ACCESS MANAGEMENT Introduction For years, security experts have outlined the best practices for privileged access management in an effort to reduce problems associated

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

Towards a cyber governance maturity model for boards of directors

Towards a cyber governance maturity model for boards of directors Towards a cyber governance maturity model for boards of directors Professor Basie von Solms Centre for Cyber Security University of Johannesburg Johannesburg, South Africa Keywords Cyber Security, Boards,

More information

How BlackBerry 2FA and BlackBerry UEM Help This Law Enforcement Agency to Protect and Serve New York

How BlackBerry 2FA and BlackBerry UEM Help This Law Enforcement Agency to Protect and Serve New York How BlackBerry 2FA and BlackBerry UEM Help This Law Enforcement Agency to Protect and Serve New York The Organization First founded in 1960, the Suffolk County Police Department provides law enforcement

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on Bring Your

More information

TAN Jenny Partner PwC Singapore

TAN Jenny Partner PwC Singapore 1 Topic: Cybersecurity Risks An Essential Audit Consideration TAN Jenny Partner PwC Singapore PwC Singapore is honoured to be invited to contribute to the development of this guideline. Cybersecurity Risks

More information

ARE YOU READY FOR GDPR?

ARE YOU READY FOR GDPR? SQL Security Whitepaper ARE YOU READY FOR GDPR? BY BOB FULLAM AND STEPHEN STOUT Demonstrate Compliance with IDERA SQL Security Suite OVERVIEW The European Union s General Data Protection Regulation (GDPR)

More information

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework JULY 2013 Business Council of Australia July 2013 1 About

More information

Recipe for a Breach: Uncontrolled Employee Access + Poor Security Habits Employee Security Habits Reveal Risky Imbalance

Recipe for a Breach: Uncontrolled Employee Access + Poor Security Habits Employee Security Habits Reveal Risky Imbalance Survey Report Recipe for a Breach: Uncontrolled Employee Access + Poor Security Habits Employee Security Habits Reveal Risky Imbalance November 2017 INTRODUCTION When thinking of insider threats, we often

More information

Our Data Protection Officer is Andrew Garrett, Operations Manager

Our Data Protection Officer is Andrew Garrett, Operations Manager Construction Youth Trust Privacy Notice We are committed to protecting your personal information Construction Youth Trust is committed to respecting and keeping safe any personal information you share

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

The power management skills gap

The power management skills gap The power management skills gap Do you have the knowledge and expertise to keep energy flowing around your datacentre environment? A recent survey by Freeform Dynamics of 320 senior data centre professionals

More information

Evolution of IT in the Finance Industry. Europe

Evolution of IT in the Finance Industry. Europe 2011 Evolution of IT in the Finance Industry Europe CONTENTS Evolution of IT in the Finance Industry... 4 Methodology... 6 Focus... 8 Finding 1: Finance Industry Has Mature View on IT Trends...10 Finding

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

When you provide personal information to us it will only be used in the ways described in this privacy policy.

When you provide personal information to us it will only be used in the ways described in this privacy policy. Website Privacy Policy Overview Welcome to this Global Payroll Management Institute website, owned and produced by the Global Payroll Management Institute, Inc. (GPMI). Our website is available to all

More information

GDPR. What is GDPR? GDPR is extraterritorial, meaning it applies to any company, processing EU resident data, irrespective of their location.

GDPR. What is GDPR? GDPR is extraterritorial, meaning it applies to any company, processing EU resident data, irrespective of their location. 1 3 5 What is GDPR? The European Union s ( EU ) General Data Protection Regulation ( GDPR ) replaces the 1995 Data Protection Directive, and while the new requirement became effective May 25, 2018, Data

More information

Asda. Privacy and Electronic Communications Regulations audit report

Asda. Privacy and Electronic Communications Regulations audit report Asda Privacy and Electronic Communications Regulations audit report Executive summary May 2018 1. Background and Scope The Information Commissioner may audit the measures taken by the provider of a public

More information

Cloud Communications for Healthcare

Cloud Communications for Healthcare Cloud Communications for Healthcare Today, many powerful business communication challenges face everyone in the healthcare chain including clinics, hospitals, insurance providers and any other organization

More information

The Problem with Privileged Users

The Problem with Privileged Users Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information

More information